Animosity 发表于 2025-3-21 20:00:34
书目名称Data Mining and Big Data影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0262918<br><br> <br><br>书目名称Data Mining and Big Data读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0262918<br><br> <br><br>calumniate 发表于 2025-3-21 21:17:41
http://reply.papertrans.cn/27/2630/262918/262918_2.png搬运工 发表于 2025-3-22 02:03:04
http://reply.papertrans.cn/27/2630/262918/262918_3.pngGyrate 发表于 2025-3-22 06:42:29
Conference proceedings 20212021, held in Guangzhou, China, in October 2021. .The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and bigCEDE 发表于 2025-3-22 12:09:29
http://reply.papertrans.cn/27/2630/262918/262918_5.png代替 发表于 2025-3-22 15:19:16
http://reply.papertrans.cn/27/2630/262918/262918_6.png代替 发表于 2025-3-22 19:54:52
http://reply.papertrans.cn/27/2630/262918/262918_7.pngexquisite 发表于 2025-3-22 22:26:56
A Classic Multi-method Collaborative Obfuscation Strategy,n, a collaborative obfuscation strategy suitable for multiple obfuscation methods is proposed in detail. Finally, we verified that the obfuscation strategy indeed improves the performance of obfuscation through experiments.音乐戏剧 发表于 2025-3-23 01:23:09
http://reply.papertrans.cn/27/2630/262918/262918_9.png爱哭 发表于 2025-3-23 05:57:01
,Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data,ignature scheme on lattices, and puts the scheme into the background of big data to realize authentication. The safety of the problem is proved by using the difficulty of small integer solutions on the lattices. Compared with other existing proxy signature schemes, it has low computational complexity and higher security.